Post job

Security Alliance company history timeline

2001

Security Alliance was founded in 2001 with the mission of providing exceptional security services with integrity and professionalism.

2002

Another coalition of the willing but not a military alliance is the Proliferation Security Initiative (PSI), also initiated in 2002.

2003

2003—ISA creates its first set of best practices guides to combat insider threats, long before insiders were a well-appreciated risk.

2005

2005—ISA chairs the congressionally appointed Cross Sector Cyber Security Working Group Committee, which focuses on the use of market incentives, rather than regulation, the way to improve private sector cybersecurity.

2008

In November of 2008 at the ISSA CISO Forum in Las Vegas, the concept of the Cloud Security Alliance was born.

The issues and opportunities surrounding cloud computing gained considerable notice in 2008 within the information security community.

2009

CSA’s outreach to the information security community to create its initial work product for the 2009 RSA Conference resulted in dozens of volunteers to research, author, edit and review CSA’s first whitepaper.

2009: Incorporated, Issued the first comprehensive best practices for secure cloud computing, “Security Guidance for Critical Areas of Focus for Cloud Computing”

2011

2011: Hosted the White House at our CSA Summit to announce the US Federal Cloud Strategy

2012

2012: Established CSA Europe in Edinburgh, UK2012: Launched the registry of cloud provider security practices, the CSA Security, Trust and Assurance Registry (STAR)

2012—The Senate rejects the Collins-Lieberman cybersecurity bill, which would have modeled cybersecurity on Sarbanes-Oxley.

2013

2013: Established CSA Asia Pacific in Singapore2013: Launched CSA STAR Certification2013: Release Big Data Security & Privacy Research

2013—As directed by Executive Order 13636, the National Institute of Standards and Technology published a draft outline of the Cybersecurity Framework.

2014

2014: Established representation in Peoples Republic of China2014: Release Software Defined Perimeter Specifications2014: Launched CSA STAR Attestation

2014—The NIST Cybersecurity Framework version 1.0 is published, with the ISA at the forefront of shaping its final form.

While it removed the stain of Yalta, the United States was concerned that it would strengthen nationalist factions in Russia that were already suspicious of Western intentions.37undefinedundefined These reservations were to be borne out when Russia invaded Crimea and the Ukraine in 2014.

2015

2015—Congress passes and the president signs the Cybersecurity Act of 2015, which adopts the ISA recommendation of extending liability protection to companies seeking to share cyber threat information.

2016

2016: Forms Australia/New Zealand Regional Coordinating Body2016: Releases ‘The Treacherous Twelve’ Cloud Computing Top Threats in 20162016: Issues Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy

2016 – ISA publishes “The Cybersecurity Social Contract: Implementing a Market-Based Model for Cybersecurity” as a policy guide for the incoming administration and Congress.

2017

2017: STARWatch Cloud Security Management Application becomes generally available2017: Establishes Third-Party Global Consultancy program2017: Releases major updates to Guidance v4.02017: Issues Code of Conduct for GDPR Compliance2017: Releases significant updates to CCSKv4

2017 – ISA and the National Association for Corporate Directors publish an updated version of the “Cyber-Risk Oversight Handbook,” which receives unprecedented endorsement from the Department of Justice and the Department of Homeland Security.

2018

2018 – ISA publishes international cyber-risk handbooks for boards of directors in the United Kingdom and Germany.

2019

2019 – ISA publishes cyber-risk handbooks for boards of directors in Latin America, Japan and Europe.

2020

2020 – ISA and the National Association of Corporate Directors publish an updated version of the cyber risk handbook for boards of directors, The Cyber-Risk Oversight 2020 Handbook.

2022

© 2022, The Heritage Foundation

Work at Security Alliance?
Share your experience
Founded
2001
Company founded
Headquarters
Doral, FL
Company headquarter
Get updates for jobs and news

Rate how well Security Alliance lives up to its initial vision.

Zippia waving zebra

Security Alliance jobs

Do you work at Security Alliance?

Does Security Alliance communicate its history to new hires?

Security Alliance history FAQs

Zippia gives an in-depth look into the details of Security Alliance, including salaries, political affiliations, employee data, and more, in order to inform job seekers about Security Alliance. The employee data is based on information from people who have self-reported their past or current employments at Security Alliance. The data on this page is also based on data sources collected from public and open data sources on the Internet and other locations, as well as proprietary data we licensed from other companies. Sources of data may include, but are not limited to, the BLS, company filings, estimates based on those filings, H1B filings, and other public and private datasets. While we have made attempts to ensure that the information displayed are correct, Zippia is not responsible for any errors or omissions or for the results obtained from the use of this information. None of the information on this page has been provided or approved by Security Alliance. The data presented on this page does not represent the view of Security Alliance and its employees or that of Zippia.

Security Alliance may also be known as or be related to Security Alliance and Security Alliance, LLC.